[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: [tor-bugs] #5477 [EFF-HTTPS Everywhere]: Surprising DOM origins before HTTPS-E/NoScript redirects have completed



#5477: Surprising DOM origins before HTTPS-E/NoScript redirects have completed
-------------------------------------+--------------------------------------
    Reporter:  Drugoy                |       Owner:  ma1            
        Type:  defect                |      Status:  reopened       
    Priority:  blocker               |   Milestone:                 
   Component:  EFF-HTTPS Everywhere  |     Version:                 
  Resolution:                        |    Keywords:  MikePerry201204
      Parent:                        |      Points:  7              
Actualpoints:  7                     |  
-------------------------------------+--------------------------------------

Comment(by pde):

 Mike, what I observe is the same as what you observe, and I believe the
 vulnerability, if there is one, is state number 2.

 On its face that does not look easily exploitable, but I think there are
 at least theoretical grounds for concern. For example, an active network
 attacker could induce state 2 and then drop a whole lot of packets or slow
 them down to an absolute trickle. That might cause state 2 to persist for
 30 seconds or longer, perhaps enough to trick a user into completing a
 password dialog.

-- 
Ticket URL: <https://trac.torproject.org:443/projects/tor/ticket/5477#comment:34>
Tor Bug Tracker & Wiki <https://trac.torproject.org/>
The Tor Project: anonymity online
_______________________________________________
tor-bugs mailing list
tor-bugs@xxxxxxxxxxxxxxxxxxxx
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-bugs